首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
在分析舰载有源干扰系统组成及战术运用方式的基础上,对有源干扰对抗反舰导弹的作用机理问题进行针对性分析研究,提出了现役反舰导弹跟踪干扰源的战场威胁,探索性地提出了舰载有源干扰有效应对这种战场威胁的战术运用方法.  相似文献   

2.
向仲  郝威  李雪 《火力与指挥控制》2012,37(11):202-205
复杂电磁环境下,跳频通信已成为舰艇战术通信的重要手段之一。研究舰载跳频通信系统抗干扰的理论,寻求可行的抗干扰方法,对保障通信联络顺畅具有现实意义。通过分析引导式跟踪干扰的原理,结合短波、超短波和微波的传播特点,明确了对跳频通信实施引导式跟踪干扰的条件,阐述了在实际应用中易产生混淆的情况,给出了提高跳频通信抗引导式跟踪干扰效能的几种对策。为正确应用跳频电台,增强海上编队通信对抗作战效能提供了参考。  相似文献   

3.
为了有效对抗反舰导弹威胁,就必须大力发展舰载雷达无源干扰技术。经过半个多世纪的发展,舰载雷达无源干扰技术已经相当成熟,达到很高的水平。本文首先概述了舰载雷达无源干扰的战术应用原理,然后综述了国外舰载雷达无源干扰装备的最新进展。  相似文献   

4.
基于信号仿真的通信干扰压制系数计算方法   总被引:1,自引:0,他引:1  
针对目前计算通信干扰压制系数方法存在的缺陷,引入信号仿真计算方法。介绍了通信干扰压制系数计算模型,研究了基于信号仿真的通信干扰压制系数计算,结合典型通信干扰战术背景,计算了不同样式干扰信号对模拟语音调频通信的干扰压制系数。实验结果表明,该方法能为通信对抗战术计算中根据通信装备和通信对抗装备的性能参数高精度、经济地计算通信干扰压制系数提供一种通用的方法。  相似文献   

5.
通过对雷达最大作用距离方程和雷达接收机获得的综合信噪比方程的研究,分析复杂电磁环境对舰载警戒雷达探测效果的影响;运用香农公式以及数字通信系统误码率公式,分析了复杂电磁环境对舰载直升机战术数据链通信的数据率和误码率的影响;并从电磁兼容、电磁频谱管控、雷达合理组网部署等技术、战术层面对提高舰载防空探测设备预警能力提出几点建议。  相似文献   

6.
以舰用水声对抗系统对抗来袭线导鱼雷为作战背景,通过理论分析和过程描述,从探测识别判断、舰艇指挥决策、布放火箭助飞干扰器、干扰潜艇平台的机动规避、布放火箭助飞/拖曳式声诱饵和舰艇远离鱼雷的机动规避六个阶段探讨了舰用水声对抗系统对抗线导鱼雷的战术运用方法,并通过图表分析得出了舰艇分布放干扰器干扰敌潜艇的最佳机动航向,以及舰艇布放声诱饵后远离鱼雷的最佳规避航向。研究结果对未来水声对抗装备器材的研发以及水声对抗作战战术的研究都有一定的指导意义。  相似文献   

7.
从通信信号传播的一般模型分析入手,结合舰载无人机对水面舰艇编队指挥通信干扰的特点,以舰载无人机最优空间配置为目标,构建了舰载无人机最优空间配置分析模型,通过仿真计算,以图的形式给出了舰载无人机最优空间配置参数和相应的分析结论;在干扰机、发射机和接收机三者在空间构成的平面内建立直角坐标系,构建了舰载无人机通信干扰有效干扰区分析模型。  相似文献   

8.
如何充分发挥小型通信干扰装备的作战效能是指挥员面临的棘手问题。本文将战术指标——干扰后的通信畅通区覆盖程度作为评估通信干扰装备分配优劣的指标,分别建立了单机和多部干扰时的通信干扰有效压制区和通信畅通区边界的计算模型,并给出了通信干扰有效压制区和通信畅通区面积的计算方法。构建了基于机会约束规划的空域频域通信干扰任务分配模型,并设计了混合蚁群算法和遗传算法的模型求解算法。最后进行了仿真实验,验证分析了模型和算法的合理性。研究成果为通信对抗战术计算和作战运用研究拓展了思路。  相似文献   

9.
投掷式通信干扰机是未来通信对抗装备发展的一种趋势,针对其压制无线战术通信的兵力部署优化问题,引入"通信干扰压制概率"和"通信干扰效益"两个指标,建立了基于双层规划的兵力部署优化模型,上层规划以整体通信干扰效益最大化为目标,下层为随机机会约束规划,以通信干扰压制概率满足一定置信水平为约束,以干扰机需求量最小化为目标。采用随机模拟、遗传算法和动态规划相结合的混合智能算法求解双层规划模型,并通过算例分析验证了模型的有效性。  相似文献   

10.
联合战术信息分发系统(JTIDS)的扩频和跳频技术能有效增强抗干扰能力。针对JTIDS系统扩频信号特点,理论分析得出对其通信频点进行干扰时,宽带干扰信号的最佳干扰带宽为2.1875MHz,单频干扰信号偏移通信信号频率800KHz时干扰效果最佳,并采用Simulink软件对结论进行了验证。所得结论为实际运用多频点阻塞式干扰JTIDS系统时,干扰信号带宽与频率的选择提供了依据。  相似文献   

11.
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West.  相似文献   

12.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   

13.
The war that Portugal was obliged to fight in Africa began in 1961 and immediately stretched the resources of its armed forces. Nowhere was this thinness more apparent than in policing the vast territory of Angola. The east and southeast of Angola were particularly vulnerable, as the area was a vast, sparsely populated region characterised by enormous featureless plains or chanas covered in tall grass and broken by an extensive river system and mountainous forests. The only military solution to policing these immense spaces was aviation and specifically the helicopter that could carry troops into battle, protect them with a gunship and bring them home when the operation was concluded. The immediate problem for the Portuguese Air Force (Força Aérea Portuguesa or FAP) in Angola and elsewhere was a scarcity of helicopters. The solution was an alliance with South Africa, which had a strong inventory of Alouette IIIs, to help in policing the east. This move was likewise in the interest of South Africa, as its threat came from Zambia through south-eastern Angola. This article examines the strategic and tactical development of this unusual, cross-cultural alliance and the symbiotic relationship that resulted in destruction of the enemies of both in Angola.  相似文献   

14.
本文主要介绍了国外焊条的现状和发展趋势,包括焊条的高韧性、高效率、低尘低毒和耐吸潮性能,为国内的焊条研究提供了参考依据。  相似文献   

15.
《Arms and Armour》2013,10(2):122-143
Many late medieval documents, notably inventories of arms and armour, of Englishmen contain references to ‘Scottish swords’ and other weapons. What did the compilers of these documents mean when they described a weapon as ‘Scottish’? How did such weapons come to be in the possession of these men? This article will attempt to explain this phenomenon drawing on primary documentary sources and surviving material culture from Glasgow Museums’ collections and others, as well as artworks from the period.  相似文献   

16.
17.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   

18.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

19.
《战略研究杂志》2012,35(5):689-711
Abstract

This article explores the effect of connectivity on strategic affairs. It argues that the effect on war's character is potentially, although not yet shown in practice, considerably large. Its effect upon the distribution of power among states in the international system is small, contrary to the claims of ‘cyberwar’ alarmists. All told, however, its effect upon strategic affairs is complex. On the one hand, it represents a significant advance in the ‘complexification’ of state strategies, understood in the sense of the production of intended effects. On the other hand, strategists today – still predominantly concerned with the conflicts and confrontations of states and organised military power – are generally missing the power which non-traditional strategic actors, better adapted to the network flows of the information age, are beginning to deploy. These new forms of organization and coercion will challenge the status quo.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号